Commit graph

11368 commits

Author SHA1 Message Date
Corey McGregor
be77fd9459 KEYCLOAK-2339 Adding impersonator details to user session notes and supporting built-in protocol mappers. 2019-03-08 09:14:42 +01:00
rmartinc
231db059b2 KEYCLOAK-8996: Provide a way to set a responder certificate in OCSP/X509 Authenticator 2019-03-07 07:57:20 +01:00
keycloak-bot
e843d84f6e Set version to 6.0.0-SNAPSHOT 2019-03-06 15:54:08 +01:00
stianst
7ad02e7318 Fixes for releasing 2019-03-06 11:38:09 +01:00
mhajas
8a750c7fca KEYCLOAK-6750 Adapt Tomcat adapter tests to new structure 2019-03-06 08:57:46 +01:00
Denis
4cde8d8534 KEYCLOAK-9686 - Compilation error in PNC for Keycloak 5.x 2019-03-06 08:36:33 +01:00
sebastienblanc
c2d5bbc662 KEYCLOAK-6979 : adding springboot tests app to parent pom 2019-03-06 08:11:46 +01:00
Sebastian Laskawiec
406097a508 KEYCLOAK-6749 Jetty App Server 2019-03-05 15:21:48 +01:00
vramik
2e7eb92f43 KEYCLOAK-8699 replace hostnames with nip.io ones to include cors tests by default 2019-03-05 12:00:01 +01:00
stianst
15478c83e4 Added release script 2019-03-05 11:45:08 +01:00
Martin Bartos RH
bec5d676e7 [KEYCLOAK-7907] Migrate model package from old testsuite 2019-03-05 09:39:17 +01:00
vramik
845275ef0f KEYCLOAK-9624 support for legacy driver for migration tests 2019-03-05 09:30:31 +01:00
Michael Parker
7bd1f32eb1 KEYCLOAK-9077 Adds support for SAML SessionNotOnOrAfter attribute in response xml serialization 2019-03-05 09:05:41 +01:00
stianst
653a08885d Added get-version script 2019-03-05 08:42:14 +01:00
stianst
c52c4fec23 KEYCLOAK-9720 Move bower/npm packaging from keycloak/keycloak-js-bower repository 2019-03-05 08:15:05 +01:00
mposolda
89d0c51e13 KEYCLOAK-3159 Migrate federation package from old testsuite 2019-03-04 13:37:12 +01:00
Gilles
f295a2e303 [KEYCLOAK-3723] Fixed updated of protocol mappers within client updates in clients-registrations resource 2019-03-04 11:57:59 +01:00
mposolda
d5b28013d1 KEYCLOAK-8523 Remove jaxrs package from old testsuite and deprecate jaxrs filter 2019-03-04 10:25:01 +01:00
Pedro Igor
6aa9096361 [KEYCLOAK-9451] - Policy evaluation fails when not evaluated against a particual resource 2019-02-28 10:38:09 -03:00
vramik
fab52ebc51 KEYCLOAK-9611 Add support to the testsuite for migration from 4.8.3.Final 2019-02-28 13:53:30 +01:00
Pedro Igor
75d9847672 [KEYCLOAK-9478] - Support multiple CIP providers in the policy enforcer configuration 2019-02-27 19:08:57 -03:00
Pedro Igor
bacc1b538f [KEYCLOAK-8855] - Tests 2019-02-27 15:39:32 -03:00
sakanaou
007c364027 Store rewritten redirect URL in adapter-core 2019-02-27 15:39:32 -03:00
Philipp Nowak
39828b2c94 [KEYCLOAK-9539] Race condition SecurityContextHolder.setAuthentication()
This is an issue with the Spring Security Keycloak Adapter relating to
 the way the Authentication is stored in the SecurityContext, causing a
 race condition in application code using that. It does not seem to
 affect actual Spring Security operation.

We had a pretty strange race condition in our application. When many
 requests were incoming at the same time, occasionally the old
 unauthenticated Authentication provided to
 KeycloakAuthenticationProvider for performing the actual authentication
 would stay the current authentication, as returned by
 SecurityContextHolder.getContext().getAuthentication(). That resulted
 in authenticated users' JavaScript requests occasionally (~1/50 given a
 large request volume) returning a 403 because the 'old' token was still
 in the context, causing Spring Security to see them as unauthenticated.

This PR resolves this issue by replacing the whole context, as suggested
 by a Spring Security contributor in jzheaux/spring-security-oauth2-resource-server#48. By default,
 SecurityContextHolder keeps the actual context object in a ThreadLocal,
 which should be safe from race-conditions. The actual Authentication
 object, however, is kept in a mere field, hence the reason for this PR.

JIRA issue: https://issues.jboss.org/browse/KEYCLOAK-9539
2019-02-27 14:58:10 -03:00
Stefan Guilhen
9c34cc7365 [KEYCLOAK-9371] Fix premature termination of sessions when remember-me is in use 2019-02-27 15:08:50 +01:00
vramik
5d205d16e8 KEYCLOAK-9167 Using kcadm to update an identity-provider instance via a json file does not work without an "internalId" present in the json 2019-02-27 14:56:36 +01:00
Tomas Kyjovsky
49a86865cf KEYCLOAK-8869 JStat monitoring for performance tests 2019-02-27 11:17:39 +01:00
mposolda
362faf3adb KEYCLOAK-6627 Closing admin clients and testing clients in testsuite 2019-02-27 08:57:42 +01:00
Tomas Kyjovsky
195aeaca68 KEYCLOAK-9000 Update stress-testing script 2019-02-26 16:38:40 +01:00
Lars Wilhelmsen
9b1ab0f992 KEYCLOAK-9116: Fixes JWK serialization of ECDSA public key coordinates.
Signed-off-by: Lars Wilhelmsen <lars@sral.org>
2019-02-25 09:53:09 -03:00
Stan Silvert
b64f30c9d7 KEYCLOAK-8522: Remove broker tests covered in new testsuite. 2019-02-25 09:40:39 -03:00
Stan Silvert
05005a1791 KEYCLOAK-8522: Migrate IdpHint tests. Remove unneeded tests. 2019-02-25 09:40:39 -03:00
Stan Silvert
fe5966d224 KEYCLOAK-8602: PatternFly 4 integration 2019-02-25 08:26:54 -03:00
Stan Silvert
ccd6d248f4 KEYCLOAK-8603: Reimplement 'back to application' in react 2019-02-25 08:26:54 -03:00
stianst
8dfd07662c KEYCLOAK-8397 Remove deprecated Keycloak Proxy 2019-02-25 08:23:12 -03:00
Simon Neaves
b5fbc04e5e KEYCLOAK-9376 Add "aud" to DEFAULT_CLAIMS_SUPPORTED
See https://issues.jboss.org/browse/KEYCLOAK-9376?_sscc=t
2019-02-25 10:21:49 +01:00
Hynek Mlnarik
37ef47d6ab KEYCLOAK-9509 Upgrade to Wildfly 15
KEYCLOAK-9584 Update Wildfly Arquillian version

KEYCLOAK-9581: Fix CookiePathTests

KEYCLOAK-9607 CLI sripts and configuration files update

KEYCLOAK-9580 Fix component registration error

KEYCLOAK-9590 Update JDG to newest version

* Infinispan is using whatever version is set in root pom.xml.

KEYCLOAK-9509 Fix Undertow tests

Co-Authored-By: vramik <vramik@redhat.com>
Co-Authored-By: sebastienblanc <scm.blanc@gmail.com>
2019-02-25 08:56:46 +01:00
Pedro Igor
99f8e5f808 [KEYCLOAK-9489] - Fixing fine-grained permission functionality 2019-02-22 09:22:14 -03:00
Pedro Igor
9314f13255 [KEYCLOAK-9093] - False-Positive UMA Policy Evaluation 2019-02-21 21:47:58 -03:00
Pedro Igor
4d5dff1d64 [KEYCLOAK-9474] - Public endpoints are returning 403 with body when enforcement mode is disabled 2019-02-21 16:27:07 -03:00
Stian Thorgersen
366ee083ac
Update pull_request_template.md 2019-02-21 12:30:16 +01:00
Stian Thorgersen
349336c6a6
Update pull_request_template.md 2019-02-21 12:29:32 +01:00
Stian Thorgersen
3a6a470640
Create pull_request_template.md 2019-02-21 12:28:31 +01:00
Stian Thorgersen
3a4e768555
Update CONTRIBUTING.md 2019-02-21 12:28:06 +01:00
Stian Thorgersen
7adde410ac
Update CONTRIBUTING.md 2019-02-21 12:27:40 +01:00
Steven Aerts
d36cb27bd9 KEYCLOAK-9526 admin console auth-url with hostname SPI 2019-02-21 11:55:11 +01:00
Freddy Tuxworth
3c0e8022a9 Added tests for common utilities CollectionUtil & HtmlUtils.
These tests were written using Diffblue Cover.
2019-02-21 11:45:17 +01:00
Gideon Caranzo
4cd617bc42 KEYCLOAK-8977 Added method to return KeycloakSession from RealmCreationEvent 2019-02-21 11:21:54 +01:00
Thibault Nélis
cc79963f81 Fix typo: "credentia" -> "credential" 2019-02-21 11:20:06 +01:00
Guilhem Lucas
b666756b8f KEYCLOAK-9320 Make theme properties available in email templates 2019-02-21 11:19:17 +01:00